{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"AXIS OS versions 10.x ant\u00e9rieures \u00e0 10.12.213 (version en support \u00e9tendu \"LTS 2022\")","product":{"name":"N/A","vendor":{"name":"Axis","scada":false}}},{"description":"AXIS OS versions 8.x ant\u00e9rieures \u00e0 8.40.37 (version en support \u00e9tendu \"LTS 2018\")","product":{"name":"N/A","vendor":{"name":"Axis","scada":false}}},{"description":"AXIS OS versions 9.x ant\u00e9rieures \u00e0 9.80.49 (version en support \u00e9tendu \"LTS 2020\")","product":{"name":"N/A","vendor":{"name":"Axis","scada":false}}},{"description":"AXIS OS versions ant\u00e9rieures \u00e0 6.50.5.15 pour les produits b\u00e9n\u00e9ficiant d'un support logiciel","product":{"name":"N/A","vendor":{"name":"Axis","scada":false}}},{"description":"AXIS OS versions 11.x ant\u00e9rieures \u00e0 11.7.57","product":{"name":"N/A","vendor":{"name":"Axis","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2023-21418","url":"https://www.cve.org/CVERecord?id=CVE-2023-21418"},{"name":"CVE-2023-21417","url":"https://www.cve.org/CVERecord?id=CVE-2023-21417"},{"name":"CVE-2023-5553","url":"https://www.cve.org/CVERecord?id=CVE-2023-5553"},{"name":"CVE-2023-21416","url":"https://www.cve.org/CVERecord?id=CVE-2023-21416"}],"links":[],"reference":"CERTFR-2023-AVI-0984","revisions":[{"description":"Version initiale","revision_date":"2023-11-29T00:00:00.000000"},{"description":"ajout avis \u00e9diteur cve-2023-5553","revision_date":"2023-11-30T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Axis.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Axis","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Axis cve-2023-5553 du 21 novembre 2023","url":"https://www.axis.com/dam/public/0a/66/25/cve-2023-5553-en-US-417789.pdf"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Axis cve-2023-21417 du 21 novembre 2023","url":"https://www.axis.com/dam/public/2a/82/12/cve-2023-21417-en-US-417791.pdf"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Axis cve-2023-21416 du 21 novembre 2023","url":"https://www.axis.com/dam/public/35/2a/a6/cve-2023-21416-en-US-417790.pdf"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Axis cve-2023-21418 du 21 novembre 2023","url":"https://www.axis.com/dam/public/49/93/55/cve-2023-21418-en-US-417792.pdf"}]}
